CN106559390A - The method and apparatus for strengthening equipment safety - Google Patents

The method and apparatus for strengthening equipment safety Download PDF

Info

Publication number
CN106559390A
CN106559390A CN201510628941.4A CN201510628941A CN106559390A CN 106559390 A CN106559390 A CN 106559390A CN 201510628941 A CN201510628941 A CN 201510628941A CN 106559390 A CN106559390 A CN 106559390A
Authority
CN
China
Prior art keywords
equipment
lock
password
information
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510628941.4A
Other languages
Chinese (zh)
Other versions
CN106559390B (en
Inventor
张锬锬
万昌洵
徐欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510628941.4A priority Critical patent/CN106559390B/en
Publication of CN106559390A publication Critical patent/CN106559390A/en
Application granted granted Critical
Publication of CN106559390B publication Critical patent/CN106559390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Abstract

The present invention relates to a kind of method and apparatus for strengthening equipment safety.The method comprising the steps of:When ID and apparatus bound is detected, then judge whether the equipment lock of ID control device is opened;If having turned on, terminate;If not opening, the information of unlatching equipment lock is exported;The triggering command of the information to unlatching equipment lock is obtained, interface is arranged according to triggering command access arrangement lock;Obtain to lock in the equipment and the password inputing on interface is set, the equipment lock is enabled according to password.The method and apparatus of above-mentioned enhancing equipment safety, judge whether the equipment lock of ID control device is opened, if being not turned on, information is exported, interface is arranged according to information access arrangement lock, get the password of input, equipment lock is enabled according to the password, after ID is stolen, because the equipment bound enables equipment lock, other people cannot realize being controlled equipment using ID, improve the safety of equipment.

Description

The method and apparatus for strengthening equipment safety
Technical field
The present invention relates to Internet of Things security fields, more particularly to a kind of method and apparatus for strengthening equipment safety.
Background technology
Internet of Things is the Internet that thing is connected with thing, and the core of Internet of Things and basis remain the Internet, be The network for extending on Internet basic and extending, its user side extend and extend to any article and article it Between, enter row information and exchange and communicate.
It is with the development of Internet of Things, general after application software account logs in application software, remotely control quilt The equipment of binding, after application software account is stolen, stealer can pass through the application software account of user Application software is logged in, the equipment that the corresponding application software account with user is bound can be viewed, and controlled to be somebody's turn to do The equipment of binding, the safety of equipment are low.
The content of the invention
Based on this, it is necessary to cause equipment by other people to be controlled because application software account is leaked for traditional, A kind of low problem of device security, there is provided method of enhancing equipment safety, can prevent other people control devices, The safety of raising equipment.
Additionally, there is a need to providing a kind of device for strengthening equipment safety, other people control devices can be prevented, is carried The safety of high equipment.
A kind of method for strengthening equipment safety, comprises the following steps:
When ID and apparatus bound is detected, then judge that the ID controls the equipment of the equipment Whether lock is opened;If having turned on, terminate;
If not opening, the information of unlatching equipment lock is exported;
The triggering command of the information to unlatching equipment lock is obtained, is entered according to the triggering command and is set Standby lock arranges interface;
Obtain to lock in the equipment and the password inputing on interface is set, the equipment lock is enabled according to the password.
A kind of device for strengthening equipment safety, including:
Judge module, for when ID and apparatus bound is detected, then judging the ID control Whether the equipment lock of the equipment is opened;If having turned on, terminate;
Output module, if for not opening, exporting the information of unlatching equipment lock;
Incision module, for obtaining the triggering command of the information to unlatching equipment lock, according to described Triggering command access arrangement lock arranges interface;
Acquisition module, arranges the password inputing on interface for obtaining to lock in the equipment, according to the password Enable the equipment lock.
The method and apparatus of above-mentioned enhancing equipment safety, after detecting ID and apparatus bound, judges to use Whether the equipment lock of family mark control device is opened, if being not turned on, exports information, according to prompting Information access arrangement lock arranges interface, the password for arranging that interface gets input is locked in equipment, according to the password Equipment lock is enabled, after ID is stolen, because the equipment bound enables equipment lock, other people cannot profit Realize being controlled equipment with ID, improve the safety of equipment.
Description of the drawings
Fig. 1 is the applied environment schematic diagram of the method operation of DFU in one embodiment;
Fig. 2 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 3 is the flow chart of the method for enhancing equipment safety in one embodiment;
Fig. 4 is to export showing for information in instant communication message mode in android system in one embodiment It is intended to;
Fig. 5 is the signal for exporting information in one embodiment in IOS systems in instant communication message mode Figure;
Schematic diagrams of the Fig. 6 for displaying information in informing in one embodiment;
Fig. 7 A are device menus entrance displaying cue mark in one embodiment, and cut equipment lock interface entrance Process schematic;
Fig. 7 B be another embodiment in device menus entrance show cue mark, and cut equipment lock interface enter The process schematic of mouth;
Schematic diagrams of the Fig. 8 for input numerical ciphers;
Fig. 9 is the schematic diagram for being input into letter code;
Figure 10 is the schematic diagram for being input into letter code;
Figure 11 is the schematic diagram for being input into pattern password;
Figure 12 is the structured flowchart of the device of enhancing equipment safety in one embodiment;
Figure 13 is the structured flowchart of the device of enhancing equipment safety in another embodiment.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with accompanying drawing and reality Example is applied, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only Only to explain the present invention, it is not intended to limit the present invention.
Fig. 1 is the applied environment schematic diagram of the method operation of DFU in one embodiment.Such as Fig. 1 institutes Show, the applied environment includes equipment 110, instant messaging application and/or gently using place terminal 120.
Equipment 110 can be various internet of things equipment, such as Intelligent bracelet, intelligent coffee cup, intelligent air condition, intelligence Energy TV etc..Equipment 110 can receive various information, and the function of being supported according to itself to output information, example Such as equipment belt display screen, then word, picture etc. can be shown.Equipment 110 can be communicated with terminal 120.If Standby 110 can carry WiFi module, bluetooth module, GSM (Global System for Mobile Communication, global mobile communication) module etc..
Instant messaging application or operation light application can be installed in terminal 120.User can be logged in by ID Instant messaging application or light application, the equipment for controlling binding perform some operations etc..Terminal 120 can for mobile phone, Panel computer, personal digital assistant etc..Light application be one without the need for downloading, that is, search application program i.e..
Fig. 2 is the internal structure schematic diagram of terminal in one embodiment.As shown in Fig. 2 the terminal includes passing through System bus connection processor, storage medium, internal memory, network interface, voice collection device, display screen, Speaker and input equipment.Wherein, the storage medium of terminal is stored with operating system, also including a kind of enhancing The device of equipment safety, the device of the enhancing equipment safety are used to realize a kind of method for strengthening equipment safety. The processor is used to provide calculating and control ability, supports the operation of whole terminal.Save as in terminal The operation of the device of the enhancing equipment safety in storage media provides environment, network interface for server or its He carries out network service by equipment, such as sends data that request of data is returned to server, the reception server etc.. The display screen of terminal can be LCDs or electric ink display screen etc., and input equipment can be shown The touch layer covered on screen, or the button arranged in terminal enclosure, trace ball or Trackpad, also may be used Being external keyboard, Trackpad or mouse etc..The terminal can be mobile phone, panel computer or individual number Word assistant.It will be understood by those skilled in the art that the structure illustrated in Fig. 2, only with application scheme phase The block diagram of the part-structure of pass, does not constitute the restriction of the terminal being applied thereon to application scheme, tool The terminal of body can be included than more or less of part shown in figure, or combine some parts, or tool There are different part arrangements.
Fig. 3 is the flow chart of the method for enhancing equipment safety in one embodiment.As shown in figure 3, a kind of increase The method of strong equipment safety, runs in terminal, comprises the following steps:
Step 302, when ID and apparatus bound is detected, then judges that the ID controls the equipment Whether equipment lock is opened, if having turned on, terminates, if not opening, execution step 304.
Specifically, ID and apparatus bound, that is, set up the binding relationship of ID and device identification. When first ID sets up binding relationship with device identification, owner of the ID for equipment.When When equipment is shared with other users mark by the owner of equipment, the other users shared are designated being total to for equipment The person of enjoying, after sharer's receiving device of equipment is shared, by set up device identification and sharer ID it Between binding relationship.
ID can be the instant messaging mark or E-mail address or other users account etc. of user's registration.It is excellent Choosing, be the instant messaging mark of user.Device identification can be device numbering or equipment MAC (Media Access Control, hardware address) address etc..Device numbering can be platform of internet of things to equipment Producer point The numbering matched somebody with somebody and equipment Producer distribute to the set of serial numbers of equipment into etc..Platform of internet of things is produced to equipment Person's distribution numbering, is easy to verify the legitimacy of equipment Producer and monitored.
When ID becomes the owner or sharer of equipment, the equipment lock of ID control device is judged Whether open, if equipment lock has turned on, terminate, if being not turned on, export the prompting of unlatching equipment lock Information.Equipment lock is the outpost of the tax office of control device, after being verified, can just be controlled the operation of equipment.With Family mark control device can be to being tied up after referring to user by the application of ID access of instant communicating or gently applying Fixed equipment sends control instruction, so as to control device performs corresponding action according to control instruction.
Step 304, exports the information of unlatching equipment lock.
Specifically, the mode of the information for opening equipment lock of output is varied, can be in the form of text Or the information of speech form or Rich Media's form output unlatching equipment lock.
Textual form refers to that word description prompting needs unlatching equipment to lock.Speech form refer to the information of will be prompted to Speech form is exported, and is clicked on and is played voice, can play information of voice prompt.Rich Media's form is referred to text The form of various combinations such as word, picture, sound, video.
In addition to exporting the information of unlatching equipment lock, also exportable equipment lock introduces control, obtains to institute The trigger action that equipment lock introduces control is stated, according to the detail information of the trigger action presentation device lock.Equipment The detail information of lock includes function introduction description of equipment lock etc..The details locked by equipment conveniently can be used Family understands the effect of equipment lock and function.
Step 306, obtains the triggering command of the information to the unlatching equipment lock, is entered according to the triggering command Enter equipment lock and interface is set.
Specifically, when the information of unlatching equipment lock is exported, can arrange in information and redirect entrance Or hyperlink address etc., obtain the triggering to entrance or hyperlink address are redirected in the information and grasp Make generation triggering command, equipment lock is entered into according to the triggering command interface is set.
Step 308, obtains the password inputing on the equipment lock setting interface, enables the equipment according to the password Lock.
Specifically, obtaining includes the step of the equipment lock arranges the password inputing on interface:Acquisition is set at this Password of the numerical ciphers, letter code, numeral inputing on standby lock setting interface together with monogram, One or more in pattern password, finger-print cipher, vocal print password.The password storage of input in server and/or In terminal.
The method of above-mentioned enhancing equipment safety, after detecting ID and apparatus bound, judges ID Whether the equipment lock of control device is opened, if being not turned on, exports information, is entered according to information Enter equipment lock and interface is set, the password for arranging that interface gets input is locked in equipment, is enabled according to the password and is set Standby lock, after ID is stolen, because the equipment bound enables equipment lock, other people cannot utilize user Mark is realized being controlled equipment, improves the safety of equipment.
In one embodiment, the step of information of equipment lock is opened in the output includes:With instant messaging Message mode shows the information of the unlatching equipment lock in instant communication message window.
The information can be with a kind of in written form, speech form, graphic form, Rich Media's form etc. Or various displayings.
Fig. 4 is to export showing for information in instant communication message mode in android system in one embodiment It is intended to.As shown in figure 4, in android system, showing unlatching equipment lock in instant communication message window Information, and there is provided enter unlatching equipment lock redirect entrance and equipment lock introduces entrance.Prompting letter Breath may include " to prevent ID stolen or lost mobile terminal, to cause equipment to be controlled by people's malice, ask Click on unlatching equipment lock ".Obtain entrance is redirected to what the unlatching equipment was locked, when equipment lock is opened first, Into the equipment of unlatching lock interface, the prompting on the equipment of unlatching lock interface " opens equipment lock, even if ID Stolen, other people cannot also log in the equipment of your ID control binding ", and unlatching protection control is provided; When opened equipment lock and equipment lock be currently at closed mode when, access arrangement lock-switch controlling interface, if Point out equipment lock not open in standby lock-switch controlling interface, get the open command that user is locked to equipment, open Open equipment lock.The trigger action that entrance is introduced to equipment lock is obtained, access arrangement lock is introduced the page, checks and set The detailed description of standby lock function and answer etc..Additionally, may also provide the synchronous online work(of permission portable computer Can, that is, same ID is allowed on mobile phone and computer while logging in online.Further, there is provided mobile Terminal anti-theft function, opens guarding against theft for mobile terminal function, can position the geographical position of mobile terminal.
Fig. 5 is the signal for exporting information in one embodiment in IOS systems in instant communication message mode Figure.As shown in figure 5, in IOS systems, showing carrying for unlatching equipment lock in instant communication message window Show information.Information may include " to prevent ID stolen or lost mobile terminal, to cause equipment quilt People's malice is controlled, and please click on unlatching equipment lock ".Entrance is redirected there is provided what unlatching equipment was locked.Acquisition is opened to this That opens equipment lock redirects entrance, when equipment lock is opened first, into the equipment of unlatching lock interface, sets in unlatching Prompting on standby lock interface " opens equipment lock, even if ID is stolen, other people cannot also log in your user The equipment of mark control binding, and unlatching protection control is provided;When equipment of opening is locked and the current place of equipment lock When closed mode, access arrangement lock-switch controlling interface points out equipment lock in equipment lock-switch controlling interface Do not open, get the open command that user is locked to equipment, open equipment lock.
In one embodiment, the step of information of equipment lock is opened in the output includes:In informing Show the information of the unlatching equipment lock.
Specifically, open up in the informing of android system or IOS systems or windows phone systems etc. Show the information of unlatching equipment lock.The information can be with written form, speech form, graphic form, One or more displaying in Rich Media's form etc..
After the information of unlatching equipment lock is illustrated in informing, pulling operation can be obtained, and obtains use Trigger action of the family to information, produces triggering command according to the trigger action, is entered according to triggering command Equipment lock arranges interface.Can be embedded in information and redirect entrance, or setting is redirected in information side Control, obtains user's click and redirects entrance or redirect the operation of control, produce triggering command according to clicking operation, Interface is arranged according to triggering command access arrangement lock.
Schematic diagrams of the Fig. 6 for displaying information in informing in one embodiment.As shown in fig. 6, being Show the information of unlatching equipment lock in the informing of system, such as with the information of written form displaying, And setting redirects control.The trigger action for redirecting control to unlatching equipment lock is obtained, equipment is opened when first During lock, into the equipment of unlatching lock interface, the prompting on the equipment of unlatching lock interface " is opened equipment lock, that is, is used Family mark is stolen, and other people cannot also log in the equipment of your ID control binding, and provide unlatching protection Control;When opened equipment lock and equipment lock be currently at closed mode when, access arrangement lock-switch control circle Face, points out equipment lock not open, gets user and the unlatching that equipment is locked is referred in equipment lock-switch controlling interface Order, opens equipment lock.
In one embodiment, the step of information of equipment lock is opened in the output includes:In instant messaging Using or the device menus porch of light application show cue mark, obtain the trigger action to the cue mark Equipment lock interface entrance is cut into, shows the information of the unlatching equipment lock in the equipment lock interface porch.
Specifically, the information can be with written form, speech form, graphic form, Rich Media's form One or more displaying in.
Fig. 7 A are device menus entrance displaying cue mark in one embodiment, and cut equipment lock interface entrance Process schematic.As shown in Figure 7 A, show in the device menus porch of instant communications applications or light application Cue mark, the labelling can be round dot or elliptical point or triangle or numeral etc., such as the first width figure orbicular spot. Labelling can be shown using color, such as redness, black etc..Acquisition is carried to the displaying of device menus porch The trigger action of indicating note is cut into equipment lock interface entrance, shows equipment lock interface and enter in such as the second width figure Mouthful, i.e., " equipment lock (not enabled) new ", while additionally provide license to good friend, modification equipment remarks, Check the function such as renewal of the equipment, unbinding.
In android system, " equipment locks (not enabled) new " is shown in equipment lock interface porch, The trigger action that interface entrance is locked to equipment is obtained, and access arrangement lock arranges interface, interface is arranged in equipment lock After password is set, equipment lock is enabled.After equipment lock is enabled, show in equipment lock interface porch and " set Standby lock (enabling) ".
Fig. 7 B be another embodiment in device menus entrance show cue mark, and cut equipment lock interface enter The process schematic of mouth.As shown in Figure 7 B, in IOS systems, show in equipment lock interface porch and " open Open equipment lock ", the trigger action that interface entrance is locked to equipment is obtained, access arrangement lock arranges interface, in equipment After lock arranges interface setting password, equipment lock is enabled.After equipment lock is enabled, interface entrance is locked in equipment Place shows " equipment lock ".
In one embodiment, obtain equipment lock arrange the password that input on interface can for numerical ciphers, In the password of letter code, numeral together with monogram, pattern password, finger-print cipher, vocal print password One or more.
Further, in one embodiment, said method also includes:Obtain selected and ID The equipment of binding, and obtain the password of input;Password of the password of the input with the equipment lock of the equipment is entered Row compares, if identical, is verified, controls the equipment, if differing, authentication failed, it is impossible to control Make the equipment.
Numerical ciphers are referred to by the password that constitute of numeral, can be 6,8, the numerals such as 10, such as 123456. Schematic diagrams of the Fig. 8 for input numerical ciphers, as shown in figure 8, interface input numerical ciphers are set in equipment lock, Such as 123456.When the numeral for gathering user input again, numerical ciphers of the numeral of collection with storage are carried out Relatively, if identical, unlock successfully, otherwise unblock failure.
Letter code refers to the password of letter composition, such as sabd.Fig. 9 is the schematic diagram for being input into letter code, As shown in figure 9, arranging interface input letter code, such as sabd in equipment lock.When gathering user input again Letter, by the letter of collection with storage letter code be compared, if identical, unlock successfully, it is no Then unblock failure.
Password of the numeral together with monogram refers to that letter and number combines the password of combination in any, such as S01z02 etc..Figure 10 is the schematic diagram for being input into letter code, arranges interface input letter code in equipment lock, Such as s01z02.Additionally, alphabet size is write may also differentiate between.When the character for gathering user input again, will collection Character with storage numeral and monogram password be compared, if identical, unlock successfully, otherwise solve Lock failure.
Pattern password refers to the password being made up of the arbitrarily drawn pattern of 9 points.Figure 11 is input pattern password Schematic diagram.As shown in figure 11, " Z " herringbone pattern of drafting, pattern password can be arranged as required to, no It is limited to this.When the pattern for gathering user input again, pattern password of the pattern of collection with storage is compared Compared with, if identical, unlocking successfully, otherwise unblock fails.
Finger-print cipher is referred to using the fingerprint of user as password.When the fingerprint for gathering user again, will collection Finger-print cipher with storage finger-print cipher be compared, if matching, unlock successfully, otherwise unlock mistake Lose.The error matched between the fingerprint and finger-print cipher that are collection is in the range of error for allowing.
Vocal print password refers to the sound of collection user as password.When the sound for gathering user again, will collection Sound with storage vocal print password be compared, if matching, unlock successfully, otherwise unlock fail. The error matched between the sound and vocal print password that are collection is in the range of error for allowing.
The mode of various setting equipment lock ciphers is provided, is facilitated user flexibility that password is set, is improved safety. Additionally, also multiple-enciphered can be set by various password combinations together, after such as a layer digital password is set, One layer pattern password is set again, after numerical ciphers are verified, into pattern password authentification interface using defeated The pattern for entering is verified, into appliance control interface after being verified.
In one embodiment, the method for above-mentioned enhancing equipment safety also includes:When detect the equipment with use Family mark is unbinding, closes the equipment lock of the equipment.
Specifically, after ID being detected with the releasing of device identification binding relationship, close the ID Control the equipment lock of the equipment.After ID logs in light application or instant messaging application, it is impossible to view solution Except the equipment of binding, its corresponding equipment lock is automatically switched off.
Equipment is unbinding with equipment with the unbinding owner that may include equipment of ID, equipment shared Person is unbinding with equipment.
After the owner of equipment relation unbinding with equipment, then there are the other users of binding relationship with equipment Mark also automatically with the unbinding relation of equipment, then close all relational users marks unbinding with equipment Equipment is locked.
When sharer and the unbinding relation of equipment of equipment, then do not receive with the other users mark of apparatus bound Affect, the equipment that need to only close this with the ID of the unbinding relation of equipment is locked.
Further, when ID again with apparatus bound when, need to judge the ID control device Equipment lock whether open, terminate if having turned on, if not opening, export the prompting letter of unlatching equipment lock Breath, obtains the triggering command of the information to the unlatching equipment lock, is locked according to the triggering command access arrangement Interface is set, is obtained the password inputing on the equipment lock setting interface, the equipment is enabled according to the password and is locked.
Further, the method for above-mentioned enhancing equipment safety also includes:Record ID and apparatus bound Binding time, is ranked up according to binding relationship of the sequencing of binding time to ID with equipment.
Specifically, the binding time of ID and apparatus bound, such as 2015 on Augusts 1,10 are recorded When 10 points 10 seconds etc., not limited to this.Tying up for all of ID and device identification is recorded on the server Determine relation and binding time, and the binding relationship according to binding time to ID with device identification is arranged Sequence, by nearest the time foremost that comes, easy-to-look-up newest binding relationship information.
Further, the method for above-mentioned enhancing equipment safety also includes:When detect ID with it is multiple not During with apparatus bound, acquisition is respectively provided with equipment lock to the plurality of distinct device, or acquisition is set to the plurality of It is standby that primary equipment lock is set.
Specifically, when ID is bound with multiple equipment, multiple distinct devices are respectively provided with equipment lock, When equipment lock is respectively provided with to each equipment, different passwords can be respectively provided with, identical password is may also set up. When obtaining to multiple equipment setting primary equipment lock, identical password can be set to the equipment of multiple equipment lock.
Multiple equipment arranges identical equipment lock cipher, easy to operate, can be to multiple equipment all after once unlocking There is control.In multiple equipment, the equipment lock of each equipment is respectively provided with password, then safer, one sets After standby equipment lock cipher is cracked, other equipment will not be caused to be also controlled by.
Figure 12 is the structured flowchart of the device of enhancing equipment safety in one embodiment.Strengthen equipment in Figure 12 The device of safety is the function structure constructed by the method corresponding to enhancing equipment safety, in place of description is detailed, Refer to described in method.A kind of as shown in figure 12, device for strengthening equipment safety, including judge module 1202, Output module 1204, incision module 1206 and acquisition module 1208.Wherein:
Judge module 1202 is used for when ID and apparatus bound is detected, then judge that the ID is controlled Whether the equipment lock of the equipment is opened;If having turned on, terminate.
Specifically, it is equipment owner or collaborative share to detect ID with the ID in apparatus bound Person.ID and apparatus bound, that is, set up the binding relationship of ID and device identification.When first When ID sets up binding relationship with device identification, owner of the ID for equipment.As the master of equipment When equipment is shared with other users mark by people, the other users shared are designated the sharer of equipment, if After standby sharer's receiving device is shared, the binding between device identification and the ID of sharer will be set up Relation.ID can be the instant messaging mark or E-mail address or other users account etc. of user's registration. Preferably, be user instant messaging mark.Device identification can be device numbering or device mac address etc.. Device numbering can be that the numbering that platform of internet of things distributes to equipment Producer and equipment Producer distribute to equipment Set of serial numbers into etc..Platform of internet of things is numbered to the distribution of equipment Producer, is easy to the conjunction to equipment Producer Method is verified and is monitored.
When ID becomes the owner or sharer of equipment, the equipment lock of ID control device is judged Whether open, if equipment lock has turned on, terminate, if being not turned on, export the prompting of unlatching equipment lock Information.Equipment lock is the outpost of the tax office of control device, after being verified, can just be controlled the operation of equipment.
If output module 1204 is used to not open, the information of unlatching equipment lock is exported.
Specifically, the mode of the information for opening equipment lock of output is varied, can be in the form of text Or the information of speech form or Rich Media's form output unlatching equipment lock.
Textual form refers to that word description prompting needs unlatching equipment to lock.Speech form refer to the information of will be prompted to Speech form is exported, and is clicked on and is played voice, can play information of voice prompt.Rich Media's form is referred to text The form of various combinations such as word, picture, sound, video.
In addition to exporting the information of unlatching equipment lock, the also exportable equipment lock of output module 1204 introduces control Part, cuts module 1206 and obtains the trigger action that control is introduced to equipment lock, according to the trigger action exhibition Show the detail information of equipment lock.The detail information of equipment lock includes function introduction description of equipment lock etc..
Incision module 1206 is used for the triggering command for obtaining the information to the unlatching equipment lock, is touched according to this The access arrangement that sends instructions lock arranges interface.
Specifically, when the information of unlatching equipment lock is exported, can arrange in information and redirect entrance Or hyperlink address etc., incision module 1206 is obtained to entrance or hyperlink are redirected in the information The trigger action of address produces triggering command, enters into equipment lock according to the triggering command and arranges interface.
Acquisition module 1208 is used to obtain the password inputing on the equipment lock setting interface, is opened according to the password Locked with the equipment.
Specifically, obtaining includes the step of the equipment lock arranges the password inputing on interface:Acquisition is set at this Password of the numerical ciphers, letter code, numeral inputing on standby lock setting interface together with monogram, One or more in pattern password, finger-print cipher, vocal print password.
The device of above-mentioned enhancing equipment safety, after detecting ID and apparatus bound, judges ID Whether the equipment lock of control device is opened, if being not turned on, exports information, is entered according to information Enter equipment lock and interface is set, the password for arranging that interface gets input is locked in equipment, is enabled according to the password and is set Standby lock, after ID is stolen, because the equipment bound enables equipment lock, other people cannot utilize user Mark is realized being controlled equipment, improves the safety of equipment.
In one embodiment, output module 1204 is additionally operable to disappear in instant messaging in instant communication message mode Breath window shows the information of the unlatching equipment lock.
The information can be with a kind of in written form, speech form, graphic form, Rich Media's form etc. Or various displayings.
In one embodiment, the output module 1204 is additionally operable to show the unlatching equipment lock in informing Information.
Specifically, open up in the informing of android system or IOS systems or windows phone systems etc. Show the information of unlatching equipment lock.The information can be with written form, speech form, graphic form, One or more displaying in Rich Media's form etc..
After the information of unlatching equipment lock is illustrated in informing, pulling operation can be obtained, and obtains use Trigger action of the family to information, produces triggering command according to the trigger action, is entered according to triggering command Equipment lock arranges interface.Can be embedded in information and redirect entrance, or setting is redirected in information side Control, obtains user's click and redirects entrance or redirect the operation of control, produce triggering command according to clicking operation, Interface is arranged according to triggering command access arrangement lock.
In one embodiment, the output module 1204 is additionally operable to the equipment in instant communications applications or light application Show cue mark at menu entries, acquisition is cut into equipment lock interface and enters to the trigger action of the cue mark Mouthful, show the information of the unlatching equipment lock in the equipment lock interface porch.
Specifically, the information can be with written form, speech form, graphic form, Rich Media's form One or more displaying in.
The acquisition module 1208 is additionally operable to obtain numerical ciphers, the pattern being input on the equipment lock setting interface One or more in the password of password, numeral together with monogram, finger-print cipher, vocal print password.
Numerical ciphers are referred to by the password that constitute of numeral, can be 6,8, the numerals such as 10, such as 123456. Schematic diagrams of the Fig. 8 for input numerical ciphers, as shown in figure 8, interface input numerical ciphers are set in equipment lock, Such as 123456.
Letter code refers to the password of letter composition, such as sabd.Fig. 9 is the schematic diagram for being input into letter code, As shown in figure 9, arranging interface input letter code, such as sabd in equipment lock.
Password of the numeral together with monogram refers to that letter and number combines the password of combination in any, such as S01z02 etc..Figure 10 is the schematic diagram for being input into letter code, arranges interface input letter code in equipment lock, Such as s01z02.
Pattern password refers to the password being made up of the arbitrarily drawn pattern of 9 points.Figure 11 is input pattern password Schematic diagram.As shown in figure 11, " Z " herringbone pattern of drafting, pattern password can be arranged as required to, no It is limited to this.
Finger-print cipher is referred to using the fingerprint of user as password.
Vocal print password refers to the sound of collection user as password.
The mode of various setting equipment lock ciphers is provided, is facilitated user flexibility that password is set, is improved safety.
Additionally, acquisition module 1208 is additionally operable to, when detecting ID and binding with multiple distinct devices, obtain Is taken and the plurality of distinct device is respectively provided with equipment lock, or primary equipment lock is set to the plurality of equipment.
Specifically, when ID is bound with multiple equipment, multiple distinct devices are respectively provided with equipment lock, When equipment lock is respectively provided with to each equipment, different passwords can be respectively provided with, identical password is may also set up. When obtaining to multiple equipment setting primary equipment lock, identical password can be set to the equipment of multiple equipment lock.
Figure 13 is the structured flowchart of the device of enhancing equipment safety in another embodiment.Strengthen in Figure 13 and set The device of standby safety be corresponding to the function structure strengthened constructed by the method for equipment safety, description in detail it Place, refer to described in method.As shown in figure 13, a kind of device for strengthening equipment safety, except including sentencing Disconnected module 1202, output module 1204, incision module 1206 and acquisition module 1208, also including closing mould Block 1210 and comparison module 1212.Wherein:
Closedown module 1210 closes setting for the equipment for the equipment is unbinding with ID when detecting Standby lock.
Specifically, after ID being detected with the releasing of device identification binding relationship, close the ID Control the equipment lock of the equipment.After ID logs in light application or instant messaging application, it is impossible to view solution Except the equipment of binding, its corresponding equipment lock is automatically switched off.
Equipment is unbinding with equipment with the unbinding owner that may include equipment of ID, equipment shared Person is unbinding with equipment.
After the owner of equipment relation unbinding with equipment, then there are the other users of binding relationship with equipment Mark also automatically with the unbinding relation of equipment, then close all relational users marks unbinding with equipment Equipment is locked.
When sharer and the unbinding relation of equipment of equipment, then do not receive with the other users mark of apparatus bound Affect, the equipment that need to only close this with the ID of the unbinding relation of equipment is locked.
Further, when ID again with apparatus bound when, need judge module 1202 to judge the user Whether the equipment lock of mark control device is opened, and terminates if having turned on, if not opening, output module 1204 The information of output unlatching equipment lock, cuts module 1206 and obtains the information to the unlatching equipment lock Triggering command, arranges interface according to the triggering command access arrangement lock, and acquisition module 1208 is obtained in the equipment Lock arranges the password inputing on interface, enables the equipment according to the password and locks.
Further, acquisition module 1208 is additionally operable to obtain the selected equipment with ID binding, and Obtain the password of input.
Comparison module 1212 is compared for the password by the password of input with the equipment lock of the equipment, if It is identical, then it is verified, controls the equipment, if differing, authentication failed, it is impossible to control the equipment.
One of ordinary skill in the art will appreciate that all or part of flow process in realizing above-described embodiment method, Computer program be can be by instruct the hardware of correlation to complete, it is non-easy that described program can be stored in one In the property lost computer read/write memory medium, the program is upon execution, it may include such as the enforcement of above-mentioned each method The flow process of example.Wherein, described storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc..
Embodiment described above only expresses the several embodiments of the present invention, and its description is more concrete and detailed, But therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for this area Those of ordinary skill for, without departing from the inventive concept of the premise, can also make it is some deformation and Improve, these belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be with appended Claim is defined.

Claims (16)

1. a kind of method for strengthening equipment safety, comprises the following steps:
When ID and apparatus bound is detected, then judge that the ID controls the equipment of the equipment Whether lock is opened;If having turned on, terminate;
If not opening, the information of unlatching equipment lock is exported;
The triggering command of the information to unlatching equipment lock is obtained, is entered according to the triggering command and is set Standby lock arranges interface;
Obtain to lock in the equipment and the password inputing on interface is set, the equipment lock is enabled according to the password.
2. method according to claim 1, it is characterised in that the prompting of equipment lock is opened in the output The step of information, includes:
In the form of text or speech form or Rich Media form output unlatching equipment lock information.
3. method according to claim 1, it is characterised in that the prompting of equipment lock is opened in the output The step of information, includes:
The prompting letter of the unlatching equipment lock is shown in instant communication message mode in instant communication message window Breath;
Or, show the information of the unlatching equipment lock in informing;
Or, show cue mark in the device menus porch of instant communications applications or light application, it is right to obtain The trigger action of the cue mark is cut into equipment lock interface entrance, locks the exhibition of interface porch in the equipment Show the information of the unlatching equipment lock.
4. method according to claim 1, it is characterised in that described to detect ID and equipment ID described in binding is equipment owner or collaborative share person.
5. method according to claim 1, it is characterised in that the acquisition is arranged in equipment lock The step of password inputing on interface, includes:
Obtain to lock in the equipment and numerical ciphers, letter code, numeral and the alphabetical group being input on interface is set One or more in the password that is combined, pattern password, finger-print cipher, vocal print password.
6. method according to claim 1, it is characterised in that methods described also includes:
When detecting, the equipment is unbinding with ID, closes the equipment lock of the equipment.
7. method according to claim 1, it is characterised in that methods described also includes:
When detecting ID and binding with multiple distinct devices, obtain and the plurality of distinct device is distinguished Setting equipment is locked, or obtains to the plurality of equipment setting primary equipment lock.
8. method according to claim 1, it is characterised in that set described in enabled according to the password After the step of standby lock, methods described also includes:
The selected equipment with ID binding is obtained, and obtains the password of input;
Password of the password of the input with the equipment lock of the equipment is compared, if identical, is verified Pass through, control the equipment, if differing, authentication failed, it is impossible to control the equipment.
9. it is a kind of strengthen equipment safety device, it is characterised in that include:
Judge module, for when ID and apparatus bound is detected, then judging the ID control Whether the equipment lock of the equipment is opened;If having turned on, terminate;
Output module, if for not opening, exporting the information of unlatching equipment lock;
Incision module, for obtaining the triggering command of the information to unlatching equipment lock, according to described Triggering command access arrangement lock arranges interface;
Acquisition module, arranges the password inputing on interface for obtaining to lock in the equipment, according to the password Enable the equipment lock.
10. device according to claim 9, it is characterised in that the output module is additionally operable to text The information of this form or speech form or Rich Media's form output unlatching equipment lock.
11. devices according to claim 9, it is characterised in that the output module is additionally operable to i.e. When communication information mode show the information of unlatching equipment lock in instant communication message window;
Or, the output module is additionally operable to the information for showing the unlatching equipment lock in informing;
Or, the output module is additionally operable to the device menus porch exhibition in instant communications applications or light application Show cue mark, obtain the trigger action to the cue mark and be cut into equipment lock interface entrance, described Equipment lock interface porch shows the information of the unlatching equipment lock.
12. devices according to claim 9, it is characterised in that described to detect ID and set Described in standby binding, ID is equipment owner or collaborative share person.
13. devices according to claim 9, it is characterised in that the acquisition module is additionally operable to obtain The equipment lock arrange be input on interface numerical ciphers, letter code, numeral is together with monogram Password, pattern password, finger-print cipher, one or more in vocal print password.
14. devices according to claim 9, it is characterised in that described device also includes:
Closedown module, for the equipment is unbinding with ID when detecting, closes the equipment Equipment is locked.
15. devices according to claim 9, it is characterised in that the acquisition module is additionally operable to when inspection When measuring ID and binding with multiple distinct devices, acquisition is respectively provided with equipment to the plurality of distinct device Lock, or primary equipment lock is set to the plurality of equipment.
16. devices according to claim 9, it is characterised in that the acquisition module is additionally operable to obtain The selected equipment with ID binding, and obtain the password of input;
Comparison module, is compared for the password by the password of the input with the equipment lock of the equipment, If identical, it is verified, controls the equipment, if differing, authentication failed, it is impossible to which control is described Equipment.
CN201510628941.4A 2015-09-28 2015-09-28 Method and apparatus for enhancing device security Active CN106559390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510628941.4A CN106559390B (en) 2015-09-28 2015-09-28 Method and apparatus for enhancing device security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510628941.4A CN106559390B (en) 2015-09-28 2015-09-28 Method and apparatus for enhancing device security

Publications (2)

Publication Number Publication Date
CN106559390A true CN106559390A (en) 2017-04-05
CN106559390B CN106559390B (en) 2020-07-17

Family

ID=58415876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510628941.4A Active CN106559390B (en) 2015-09-28 2015-09-28 Method and apparatus for enhancing device security

Country Status (1)

Country Link
CN (1) CN106559390B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108335695A (en) * 2017-06-27 2018-07-27 腾讯科技(深圳)有限公司 Sound control method, device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699835A (en) * 2009-09-16 2010-04-28 中兴通讯股份有限公司 Method for realizing safe use of mobile phone through safe lock and corresponding device
CN104066203A (en) * 2014-06-20 2014-09-24 可牛网络技术(北京)有限公司 Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal
CN104144109A (en) * 2014-01-24 2014-11-12 腾讯科技(深圳)有限公司 Equipment control method, device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699835A (en) * 2009-09-16 2010-04-28 中兴通讯股份有限公司 Method for realizing safe use of mobile phone through safe lock and corresponding device
CN104144109A (en) * 2014-01-24 2014-11-12 腾讯科技(深圳)有限公司 Equipment control method, device and system
CN104066203A (en) * 2014-06-20 2014-09-24 可牛网络技术(北京)有限公司 Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108335695A (en) * 2017-06-27 2018-07-27 腾讯科技(深圳)有限公司 Sound control method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN106559390B (en) 2020-07-17

Similar Documents

Publication Publication Date Title
CN103377332B (en) The method of access application and device
CN104375836B (en) A kind of method and device of displaying screen locking window
CN102842007B (en) Access control method and system of mobile terminal application program
US20150033364A1 (en) Method and Apparatus for the Protection of Application Software
KR101719933B1 (en) Method for producing dynamic data structures for authentication and/or password identification
JP5727008B2 (en) Operating system unlocking method and mobile phone
CN109636966A (en) Control method for door lock, system, device, electronic equipment and storage medium
CN105205370A (en) Safety protection method for mobile terminal, mobile terminal, safety system and application method
CN206522020U (en) A kind of intelligent door lock and system
CN106778138A (en) The control method and device of software license limit
CN104142796A (en) Unlocking method of terminal and terminal
CN106203011A (en) The method and apparatus entering operating system desktop
CN107633169A (en) A kind of terminal unlock method, terminal and computer-readable recording medium
CN106372479A (en) Mobile terminal and method of controlling the same
CN106572082A (en) Approval signature verifying method, mobile device, terminal device and system
CN107665297A (en) Mobile terminal and finger print safety implementation method and storage medium
CN102968275A (en) Unlocking method and system of mobile terminal
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN107180173A (en) unlocking method and device
CN108604268A (en) A kind of voice unlocking method and terminal of terminal
CN106355684B (en) Control method, the device and system of controlled plant
CN101286245A (en) Touch panel handwriting recognition entrance guard system and accomplishing method
CN106775326A (en) A kind of screen control method and device for mobile terminal
CN106411811A (en) Authentication method, system and device of accessing customer service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant